Keynote Speakers


Anthony T.S. Ho
(University of Surrey, UK)
Applications of Multimedia Security and Forensic Techniques for Secure Communication, Protection and Detection of Data Content
Abstract: The tremendous growth of advanced telecommunication and Internet technologies in the past two decades has led to the proliferation of multimedia content for digital transmission and storage. The talk will give an overview of the convergence of technologies in the information forensics and security domain such as data hiding techniques and their applications to digital images. For example, image steganography for secure communication of secret messages via an open channel, and digital watermarking for protection and authentication of content integrity. Finally, the talk will also introduce forensic techniques for identification and forgery detection of images (including biometric data) and videos, as well as detection of anomalies in keystroke and network traffic data based on the application of Benford’s Law.
Biography: Professor Anthony (Tony) T.S. Ho holds a Personal Chair in Multimedia Security and served as Head of Department of Computer Science, University of Surrey from 2010 to 2015. He is a Guest Professor of Wuhan University of Technology, China. Tony was the recipient of the prestigious Institution of Engineering and Technology (IET) Innovation in Engineering Award under the Security category for his research and commercialization work on digital watermarking in 2006.

Tony obtained his BSc (Hons) in Physical Electronics from Northumbria University in 1979, his MSc in Applied Optics from Imperial College London in 1980 and his PhD in Digital Image Processing from King's College London, University of London in 1983. After graduation, he worked in technical management positions in industry for 11 years in the UK and Canada. From 1994 to 2005, Tony was a Senior Lecturer and then Associate Professor at Nanyang Technological University (NTU), Singapore. He has published more than 140 articles in international journals and conference proceedings as well as 8 international patents granted related to watermarking and steganography.

Tony is Founding Editor-in-Chief of the International Journal of Information Security and Applications (JISA) and an Area Editor for Signal Processing: Image Communication, both published by Elsevier. He was recently appointed as Associate Editor for IEEE Transactions on Information Forensics and Security (TIFS) for three years commencing January 2016, He has also served as Associate Editor for IEEE Signal Processing Letters (SPL) (2014-2016), as well as an Associate Editor for EURASIP Journal of Image and Video Processing published by Springer. He was invited keynote speaker at the International Symposium on Information Technology Convergence (ISITC’2015), 1st ACM Workshop on Information Hiding and Multimedia Security (IHMMSec'2013) and IEEE International Conference on Advanced Infocomm Technology (ICAIT’2010).

He is currently the elected Section Secretary of IEEE UK and Ireland Section and has served as Technical Committee Member on a number of IEEE Technical Society Chapters including Signal Processing Society (SPS) IFS-TC, Circuits and Systems Society (CASS) MSA-TC and VSPC-TC. Tony is a Fellow of Institution of Engineering and Technology (FIET), Fellow of Institute of Physics (FInstP), Fellow of British Computer Society (FBCS) and Senior Member of IEEE.

Atsuko Miyaji
(Osaka University/JAIST/CREST, Japan)
Privacy-Preserving Big Data Analysis
Abstract: Big data is often collected and kept independently in various organizations. These data sometimes need to be integrated to get the detailed analysis without violating any privacy. That is, no organization learns more information about other organizations’ private data than what can be deduced from the analysis. Privacy-preserving multiset operations, conducted over the integrated data are important tools pf privacy preserving computations.
In this talk, we focus on multiset operations such as union, intersection, cardinality set-intersection, etc. We review various protocols to perform privacy-preserving multiset operations from the point of view of efficiency, privacy, and scalability. Finally, we apply these results to practical situations and investigate how privacy-preserving big data analysis is achieved by multiset operations.
Biography: Atsuko Miyaji is a professor at Osaka University since 2015 and a professor at Japan Advanced Institute of Science and Technology (JAIST) since 2007.

She received the Dr. Sci. degrees in mathematics from Osaka University, Japan in 1997. She joined Panasonic Co., LTD from 1990 to 1998 and engaged in research and development for secure communication. She was an associate professor at Japan Advanced Institute of Science and Technology (JAIST) in 1998. She joined the computer science department of the University of California, Davis from 2002 to 2003. She had been the director of Library of JAIST from 2008 to 2012.

Her research interests include the privacy, information security, and application of number theory into cryptography. She has published more than 160 articles in international journals and conference proceedings. She was invited speaker at the 1st International Conference on Future Data and Security Engineering (FDSE 2014), 6th International Conference on Internet and Distributed Computing Systems (IDCS 2013) and the 14th International Conference on Information and Security Cryptology (ICISC 2011).

She is a member of the International Association for Cryptologic Research, the Institute of Electronics, Information and Communication Engineers, the Information Processing Society of Japan, and the Mathematical Society of Japan. She was program chair of several research conferences and workshops: ACNS'16, ProvSec'15, Pairing'10, CANS'09, and IWSEC'07.

Eric Lam
(Director for Asia, Enterprise Cybersecurity Group)
Staying Secure in a Cloud-First Mobile-First World
Abstract:
  • Top security threats facing your business—and how to respond
  • The digital world requires new approaches to protect against, detect, and respond to security threats.
  • Strategies
    • How to protect and detect?
    • Protecting against identity compromise and identify breaches before they cause damage
    • Ensuring device security while enabling mobile work for your users
    • The unique perspective Microsoft brings to cybersecurity
Biography: Eric Lam leads the Enterprise Cybersecurity Group within the Enterprise & Partner Group at Microsoft. The ECG’s mission is to empower enterprises to confidently move to the cloud and modernize their platforms by delivering the security solutions, expertise and services needed to keep their infrastructure & information safe.

Before joining Microsoft, Eric was Director for Fraud & Risk Intelligence, Asia-Pacific & Japan for RSA Security, the leading Security and Fraud Prevention solutions provider. Prior to RSA, Eric was with Symantec, as Sales Director Asia-Pacific & Japan, holding responsibility for various lines of business, including Endpoint Security, Data Loss Prevention and Governance, Risk & Compliance (GRC) solutions. In these roles, Eric has served as a trusted advisor to organizations in identifying security risks to their information technology infrastructures, helping protect their information technology systems and applications from cyber-attacks and achieving compliance with internal policies and external regulations.

Eric is a cybersecurity industry leader with a proven track record for building and leading high-performing global enterprise solution teams. Eric is a frequent speaker on topics of cybersecurity best practices, online banking fraud, identity & information security, mobile security, privacy and compliance.

Eric is a graduate of National University of Singapore, with an MBA from the same university.

Kui Ren
(University at Buffalo, State University of New York)
Towards Secure Search Over Large Encrypted Datasets
Abstract: Various large datasets are being constantly generated, collected, and stored by organizations of all sizes today. Along with the growing data is the increasing amount of private and sensitive information that must be carefully managed and properly secured. Traditional approaches for securing the data by encryption usually fall short of fulfilling the purpose, as they naturally prevent any meaningful operations, in particular searching capability over the encrypted data. On the other hand, supporting fast and versatile search for effective information retrieval is indispensable when working with any large datasets, and it has been ubiquitously demanded in almost every big data storage system today. In this talk, we will survey encrypted search designs that have received wide attentions recently for their potential to address the fundamental conflict between encrypted data storage and search. Among the wide range of literature in this area, we will introduce and carefully examine a number of noteworthy designs as well as some of our own early research efforts, with focus on their tradeoffs among functionality, efficiency, and security. We will also illustrate other challenging issues that are currently hindering the deployment of encrypted search over large datasets in practice. Finally, we will discuss some possible solution directions to tackle the challenges.
Biography: Kui Ren is a professor of Computer Science and Engineering and the director of UbiSeC Lab at State University of New York at Buffalo (UB). He received his PhD degree from Worcester Polytechnic Institute. Kui's current research interest spans Cloud & Outsourcing Security, Wireless & Wearable Systems Security, and Mobile Sensing & Crowdsourcing. His research has been supported by NSF, DoE, AFRL, MSR, and Amazon. He received UB Exceptional Scholar Award for Sustained Achievement in 2016, UB SEAS Senior Researcher of the Year Award in 2015, Sigma Xi/IIT Research Excellence Award in 2012, and NSF CAREER Award in 2011. Kui has published 170 peer-review journal and conference papers and received several Best Paper Awards including IEEE ICNP 2011. He currently serves as an associate editor for IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Mobile Computing, IEEE Wireless Communications, IEEE Internet of Things Journal, and IEEE Transactions on Smart Grid. Kui is a Fellow of IEEE, a Distinguished Lecturer of IEEE, a member of ACM, and a past board member of Internet Privacy Task Force, State of Illinois.